Notice: Undefined index: option in /var/www/html/jc.infradapt.com/plugins/system/fixfrontedit/fixfrontedit.php on line 20 Security - Page 5

Infradapt Blog

This is some blog description about this site

Hackers Reveal What Sony Movie Executives Really Think, and it’s Not Pretty

Hackers Reveal What Sony Movie Executives Really Think, and it’s Not Pretty
Strict Standards: Declaration of JParameter::loadSetupFile() should be compatible with JRegistry::loadSetupFile() in /var/www/html/jc.infradapt.com/libraries/joomla/html/parameter.php on line 512

b2ap3_thumbnail_sony_data_leak_400.jpgOne of the most publicized hacks we have seen is last December’s breach of Sony Pictures Entertainment by the Guardians of Peace. In addition to the hackers exposing Sony’s budget, plans for layoffs, and 3,800 SSNs, they leaked personal emails from company executives. This incident should make every business owner a little nervous.

0 Comment

Can “Spaced Repetition” Be the Key to Remembering Complex Passwords?

Can “Spaced Repetition” Be the Key to Remembering Complex Passwords?

b2ap3_thumbnail_password_login_400.jpgIs the password an outdated type of security measure? This question seems to be getting asked around quite a bit, especially with more powerful threats loose all over the Internet. Unfortunately, the fault in passwords generally lies in the fact that humans generally don’t pick passwords that are secure enough. Thanks to a new method called “spaced repetition,” it seems there might be some hope left for the password after all.

0 Comment

Cyberattacks Can Influence the Physical World in Unforeseen Ways

Cyberattacks Can Influence the Physical World in Unforeseen Ways

b2ap3_thumbnail_hack_attack_manufacturing_400.jpgWhen you think of viruses and malware, you think of attacks on a digital scale. An attack in the digital world can’t do anything in the physical world, right? It turns out that hacking can lead to bigger problems, like the recent meltdown of a blast furnace at a German steel mill.

0 Comment

Improve Content Filtering with Google Chrome’s Safe Browsing Feature

Improve Content Filtering with Google Chrome’s Safe Browsing Feature

b2ap3_thumbnail_chrome_safe_browsing_400.jpgMalware often takes the form of certain unrecognizable web entities, which can make detecting threats tricky at times. New features in popular web browsers, most notably Google Chrome, are making progress toward identifying these threats before they cause your business harm. Chrome’s “Safe Browsing” feature is a good tool to augment your current network security practices.

0 Comment

Search Engine Wars: Protect Yourself From Malicious Websites

Search Engine Wars: Protect Yourself From Malicious Websites

b2ap3_thumbnail_search_security_400.jpgWhile most search engines are pretty good at weeding out malicious sites and not displaying them, some are better than others. According to AV-Test, a German independent testing lab, the top search engines, Bing and Google, are miles apart in terms of secure searching.

0 Comment

DDoS Attacks Can Lead to a Lot More than an Overloaded Server

DDoS Attacks Can Lead to a Lot More than an Overloaded Server

b2ap3_thumbnail_ddos_attacks_becoming_a_problem_400.jpgWe’ve mentioned distributed denial of service attacks (DDoS) before, and we’ve emphasized the importance of protecting yourself from threats which can cause downtime. However, we think the recent attacks by Lizard Squad take DDoS to an entirely new level.

0 Comment

Is Your Healthcare Organization HIPAA Compliant?

Is Your Healthcare Organization HIPAA Compliant?

b2ap3_thumbnail_hipaa_is_protecting_you_400.jpgTechnology plays a crucial role in the healthcare industry, and thanks to the Health Information Technology for Economic and Clinical Health Act (HITECH), healthcare providers and insurance companies in the United States have to abide by a specific set of regulations when it comes to handling patient data.

0 Comment

Vulnerability WinShock Gets Patch 19 Years Later

Vulnerability WinShock Gets Patch 19 Years Later

b2ap3_thumbnail_problem_solved_400.jpgAfter a long 19 years, a critical vulnerability found in the Windows series of operating systems has been patched. IBM informed Microsoft of the flaw back in May 2014. The flaw, which allows for remote code execution via a packet to a Windows server, is found in every Windows operating system since Windows 95.

0 Comment

Joomla! Debug Console

Session

Profile Information

Memory Usage

Database Queries